WO2016036752A3 - Systèmes et procédés permettant de créer et de modifier des listes de contrôle d'accès - Google Patents
Systèmes et procédés permettant de créer et de modifier des listes de contrôle d'accès Download PDFInfo
- Publication number
- WO2016036752A3 WO2016036752A3 PCT/US2015/047964 US2015047964W WO2016036752A3 WO 2016036752 A3 WO2016036752 A3 WO 2016036752A3 US 2015047964 W US2015047964 W US 2015047964W WO 2016036752 A3 WO2016036752 A3 WO 2016036752A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- creating
- systems
- methods
- access control
- control lists
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/22—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5058—Service discovery by the service manager
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/04—Processing captured monitoring data, e.g. for logfile generation
- H04L43/045—Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5003—Managing SLA; Interaction between SLA and QoS
- H04L41/5009—Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/06—Generation of reports
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Human Computer Interaction (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
Abstract
Selon des modes de réalisation, la présente invention peut présenter des informations sur des services hébergés et utilisés par différents actifs sur un réseau, et permettre à des utilisateurs de contrôler l'accès à ces services. En particulier, des modes de réalisation de l'invention peuvent être utilisés pour présenter un ou plusieurs services hébergés par un actif en réseau, et pour commander l'accès à ces services par d'autres actifs en réseau sur la base de l'entrée de l'utilisateur.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP15838627.6A EP3238407A4 (fr) | 2014-09-05 | 2015-09-01 | Systèmes et procédés permettant de créer et de modifier des listes de contrôle d'accès |
RU2017127710A RU2679179C1 (ru) | 2014-09-05 | 2015-09-01 | Системы и способы для создания и модификации списков управления доступом |
Applications Claiming Priority (10)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201462046807P | 2014-09-05 | 2014-09-05 | |
US62/046,807 | 2014-09-05 | ||
US201462060433P | 2014-10-06 | 2014-10-06 | |
US62/060,433 | 2014-10-06 | ||
US201562103496P | 2015-01-14 | 2015-01-14 | |
US62/103,496 | 2015-01-14 | ||
US201562137590P | 2015-03-24 | 2015-03-24 | |
US62/137,590 | 2015-03-24 | ||
US14/821,103 | 2015-08-07 | ||
US14/821,103 US9769174B2 (en) | 2013-06-14 | 2015-08-07 | Systems and methods for creating and modifying access control lists |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2016036752A2 WO2016036752A2 (fr) | 2016-03-10 |
WO2016036752A3 true WO2016036752A3 (fr) | 2017-05-04 |
Family
ID=55440482
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2015/047964 WO2016036752A2 (fr) | 2014-09-05 | 2015-09-01 | Systèmes et procédés permettant de créer et de modifier des listes de contrôle d'accès |
Country Status (4)
Country | Link |
---|---|
US (1) | US10728251B2 (fr) |
EP (1) | EP3238407A4 (fr) |
RU (1) | RU2679179C1 (fr) |
WO (1) | WO2016036752A2 (fr) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9088541B2 (en) | 2013-05-31 | 2015-07-21 | Catbird Networks, Inc. | Systems and methods for dynamic network security control and configuration |
US11196636B2 (en) | 2013-06-14 | 2021-12-07 | Catbird Networks, Inc. | Systems and methods for network data flow aggregation |
US9912549B2 (en) | 2013-06-14 | 2018-03-06 | Catbird Networks, Inc. | Systems and methods for network analysis and reporting |
US10180972B1 (en) | 2015-10-30 | 2019-01-15 | Intuit Inc. | Intelligent batching of verification requests for profile stores |
US10038694B1 (en) * | 2016-03-30 | 2018-07-31 | EMC IP Holding Company LLC | System and method for security mode-based authorization for data management operations in a multi-tenant protection storage system |
US10581893B2 (en) * | 2016-12-06 | 2020-03-03 | Brigham Young University (Byu) | Modeling of attacks on cyber-physical systems |
US10404751B2 (en) * | 2017-02-15 | 2019-09-03 | Intuit, Inc. | Method for automated SIEM custom correlation rule generation through interactive network visualization |
US10205736B2 (en) | 2017-02-27 | 2019-02-12 | Catbird Networks, Inc. | Behavioral baselining of network systems |
US11329988B2 (en) * | 2017-06-28 | 2022-05-10 | Telefonaktiebolaget Lm Ericsson (Publ) | Access to a service in a network |
US20190102841A1 (en) * | 2017-10-04 | 2019-04-04 | Servicenow, Inc. | Mapping engine configurations with task managed workflows and grid user interfaces |
US10977209B2 (en) * | 2017-10-23 | 2021-04-13 | Spectra Logic Corporation | Bread crumb directory with data migration |
US11099818B2 (en) * | 2018-12-11 | 2021-08-24 | Jpmorgan Chase Bank, N.A. | Application programming interface (API) creator and deployment tool |
RU2724796C1 (ru) * | 2019-02-07 | 2020-06-25 | Акционерное общество "Лаборатория Касперского" | Система и способ защиты автоматизированных систем при помощи шлюза |
RU2746105C2 (ru) | 2019-02-07 | 2021-04-07 | Акционерное общество "Лаборатория Касперского" | Система и способ конфигурирования шлюза для защиты автоматизированных систем |
US11363041B2 (en) * | 2020-05-15 | 2022-06-14 | International Business Machines Corporation | Protecting computer assets from malicious attacks |
US20220159029A1 (en) * | 2020-11-13 | 2022-05-19 | Cyberark Software Ltd. | Detection of security risks based on secretless connection data |
US20230069738A1 (en) * | 2021-08-23 | 2023-03-02 | Fortinet, Inc | Systems and Methods for Automated Risk-Based Network Security Focus |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040075675A1 (en) * | 2002-10-17 | 2004-04-22 | Tommi Raivisto | Apparatus and method for accessing services via a mobile terminal |
US20040243707A1 (en) * | 2001-10-01 | 2004-12-02 | Gavin Watkinson | Computer firewall system and method |
US20050125389A1 (en) * | 2003-12-09 | 2005-06-09 | Electronic Data Systems Corporation | Providing access to a service using a service engine |
US20110277034A1 (en) * | 2010-05-06 | 2011-11-10 | Tenable Network Security, Inc. | System and method for three-dimensional visualization of vulnerability and asset data |
US20140213371A1 (en) * | 2011-08-04 | 2014-07-31 | Playware Studios Asia Pte Ltd | Method and System for Hosting Transient Virtual Worlds that can be Created, Hosted and Terminated Remotely and Automatically |
Family Cites Families (93)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5657470A (en) | 1994-11-09 | 1997-08-12 | Ybm Technologies, Inc. | Personal computer hard disk protection system |
US6292833B1 (en) | 1998-07-17 | 2001-09-18 | Openwave Systems Inc. | Method and apparatus for providing access control to local services of mobile devices |
US6278694B1 (en) | 1999-04-16 | 2001-08-21 | Concord Communications Inc. | Collecting and reporting monitoring data from remote network probes |
US7757271B2 (en) * | 2000-04-19 | 2010-07-13 | Hewlett-Packard Development Company, L.P. | Computer system security service |
AU2003228541A1 (en) | 2002-04-15 | 2003-11-03 | Core Sdi, Incorporated | Secure auditing of information systems |
US20040078105A1 (en) * | 2002-09-03 | 2004-04-22 | Charles Moon | System and method for workflow process management |
US6952779B1 (en) * | 2002-10-01 | 2005-10-04 | Gideon Cohen | System and method for risk detection and analysis in a computer network |
US7624375B2 (en) * | 2003-06-12 | 2009-11-24 | National Instruments Corporation | Automatically configuring a graphical user interface element to bind to a graphical program |
US7827602B2 (en) | 2003-06-30 | 2010-11-02 | At&T Intellectual Property I, L.P. | Network firewall host application identification and authentication |
US7346922B2 (en) | 2003-07-25 | 2008-03-18 | Netclarity, Inc. | Proactive network security system to protect against hackers |
US7519996B2 (en) | 2003-08-25 | 2009-04-14 | Hewlett-Packard Development Company, L.P. | Security intrusion mitigation system and method |
US7194769B2 (en) | 2003-12-11 | 2007-03-20 | Massachusetts Institute Of Technology | Network security planning architecture |
US7281114B2 (en) | 2003-12-26 | 2007-10-09 | Tdk Corporation | Memory controller, flash memory system, and method of controlling operation for data exchange between host system and flash memory |
US8166554B2 (en) * | 2004-02-26 | 2012-04-24 | Vmware, Inc. | Secure enterprise network |
US7499994B2 (en) | 2004-03-30 | 2009-03-03 | Emc Corporation | System and method of providing performance information for a communications network |
US7877599B2 (en) | 2004-05-28 | 2011-01-25 | Nokia Inc. | System, method and computer program product for updating the states of a firewall |
US20060021034A1 (en) * | 2004-07-22 | 2006-01-26 | Cook Chad L | Techniques for modeling changes in network security |
US7529195B2 (en) * | 2004-07-30 | 2009-05-05 | Fortiusone, Inc. | System and method of mapping and analyzing vulnerabilities in networks |
US20060041936A1 (en) * | 2004-08-19 | 2006-02-23 | International Business Machines Corporation | Method and apparatus for graphical presentation of firewall security policy |
US7668925B1 (en) | 2005-01-28 | 2010-02-23 | Pmc-Sierra, Inc. | Method and apparatus for routing in SAS using logical zones |
US8116226B1 (en) | 2005-01-28 | 2012-02-14 | PMC-Sierra, USA Inc. | Method and apparatus for broadcast primitive filtering in SAS |
US7593013B2 (en) | 2005-03-11 | 2009-09-22 | University Of Utah Research Foundation | Systems and methods for displaying and querying heterogeneous sets of data |
US8117340B2 (en) | 2005-04-25 | 2012-02-14 | Microsoft Corporation | Trans-network roaming and resolution with web services for devices |
US20070006315A1 (en) | 2005-07-01 | 2007-01-04 | Firas Bushnaq | Network asset security risk surface assessment apparatus and method |
US9787556B2 (en) | 2005-08-19 | 2017-10-10 | Cpacket Networks Inc. | Apparatus, system, and method for enhanced monitoring, searching, and visualization of network data |
US20070079307A1 (en) | 2005-09-30 | 2007-04-05 | Puneet Dhawan | Virtual machine based network carriers |
US7930752B2 (en) | 2005-11-18 | 2011-04-19 | Nexthink S.A. | Method for the detection and visualization of anomalous behaviors in a computer network |
US20070143827A1 (en) | 2005-12-21 | 2007-06-21 | Fiberlink | Methods and systems for intelligently controlling access to computing resources |
US7801128B2 (en) | 2006-03-31 | 2010-09-21 | Amazon Technologies, Inc. | Managing communications between computing nodes |
US8307444B1 (en) | 2006-06-12 | 2012-11-06 | Redseal Networks, Inc. | Methods and apparatus for determining network risk based upon incomplete network configuration data |
US7886351B2 (en) | 2006-06-19 | 2011-02-08 | Microsoft Corporation | Network aware firewall |
US9003292B2 (en) | 2006-07-06 | 2015-04-07 | LiveAction, Inc. | System and method for network topology and flow visualization |
US8214889B2 (en) | 2006-11-03 | 2012-07-03 | Microsoft Corporation | Selective auto-revocation of firewall security settings |
US7849497B1 (en) * | 2006-12-14 | 2010-12-07 | Athena Security, Inc. | Method and system for analyzing the security of a network |
US8020207B2 (en) | 2007-01-23 | 2011-09-13 | Alcatel Lucent | Containment mechanism for potentially contaminated end systems |
US7711979B2 (en) | 2007-02-16 | 2010-05-04 | Symantec Corporation | Method and apparatus for flexible access to storage facilities |
US7792990B2 (en) | 2007-04-30 | 2010-09-07 | Hewlett-Packard Development Company, L.P. | Remote client remediation |
EP2163063A2 (fr) * | 2007-05-24 | 2010-03-17 | Iviz Techno Solutions Pvt. Ltd | Procédé et système pour simuler une attaque de pirate sur un réseau |
US8209738B2 (en) * | 2007-05-31 | 2012-06-26 | The Board Of Trustees Of The University Of Illinois | Analysis of distributed policy rule-sets for compliance with global policy |
US20090199298A1 (en) * | 2007-06-26 | 2009-08-06 | Miliefsky Gary S | Enterprise security management for network equipment |
US9118706B2 (en) * | 2007-06-29 | 2015-08-25 | Verizon Patent And Licensing Inc. | Using imported data from security tools |
US8099787B2 (en) * | 2007-08-15 | 2012-01-17 | Bank Of America Corporation | Knowledge-based and collaborative system for security assessment of web applications |
US8667556B2 (en) * | 2008-05-19 | 2014-03-04 | Cisco Technology, Inc. | Method and apparatus for building and managing policies |
US8713627B2 (en) | 2008-08-14 | 2014-04-29 | Juniper Networks, Inc. | Scalable security services for multicast in a router having integrated zone-based firewall |
US20100058456A1 (en) * | 2008-08-27 | 2010-03-04 | Sushil Jajodia | IDS Sensor Placement Using Attack Graphs |
US8612372B2 (en) | 2008-08-29 | 2013-12-17 | International Business Machines Corporation | Detection rule-generating facility |
CN101854340B (zh) | 2009-04-03 | 2015-04-01 | 瞻博网络公司 | 基于访问控制信息进行的基于行为的通信剖析 |
US8205035B2 (en) | 2009-06-22 | 2012-06-19 | Citrix Systems, Inc. | Systems and methods for integration between application firewall and caching |
US9621516B2 (en) * | 2009-06-24 | 2017-04-11 | Vmware, Inc. | Firewall configured with dynamic membership sets representing machine attributes |
US8131992B2 (en) | 2009-07-01 | 2012-03-06 | Infoblox Inc. | Methods and apparatus for identifying the impact of changes in computer networks |
US9201077B2 (en) * | 2009-07-27 | 2015-12-01 | Colorado State University Research Foundation | Direct enzyme immunoassay for measurement of serum progesterone levels |
EP2299363B1 (fr) | 2009-09-21 | 2013-01-09 | STMicroelectronics (Rousset) SAS | Procédé de nivellement de l'usure dans une mémoire non volatile |
US8407800B2 (en) * | 2009-11-24 | 2013-03-26 | Honeywell International Inc. | Method for software vulnerability flow analysis, generation of vulnerability-covering code, and multi-generation of functionally-equivalent code |
EP2357575A1 (fr) * | 2010-02-12 | 2011-08-17 | Research In Motion Limited | Navigation prédictive et à base d'image |
US9268945B2 (en) * | 2010-03-19 | 2016-02-23 | Contrast Security, Llc | Detection of vulnerabilities in computer systems |
US8832835B1 (en) | 2010-10-28 | 2014-09-09 | Symantec Corporation | Detecting and remediating malware dropped by files |
US8683560B1 (en) | 2010-12-29 | 2014-03-25 | Amazon Technologies, Inc. | Techniques for credential generation |
CA2835210C (fr) | 2011-05-12 | 2019-11-12 | Airpatrol Corporation | Gestion d'interaction de reseau pour des dispositifs |
US8516241B2 (en) * | 2011-07-12 | 2013-08-20 | Cisco Technology, Inc. | Zone-based firewall policy model for a virtualized data center |
EP2737404A4 (fr) | 2011-07-26 | 2015-04-29 | Light Cyber Ltd | Procédé de détection d'actions anormales dans un réseau informatique |
US8839349B2 (en) | 2011-10-18 | 2014-09-16 | Mcafee, Inc. | Integrating security policy and event management |
US9009319B2 (en) | 2012-01-18 | 2015-04-14 | Rackspace Us, Inc. | Optimizing allocation of on-demand resources using performance |
US9058198B2 (en) | 2012-02-29 | 2015-06-16 | Red Hat Inc. | System resource sharing in a multi-tenant platform-as-a-service environment in a cloud computing system |
US8955036B2 (en) | 2012-04-11 | 2015-02-10 | Mcafee, Inc. | System asset repository management |
US9189395B2 (en) | 2012-04-27 | 2015-11-17 | Seagate Technology Llc | Method and apparatus for adjustable virtual addressing for data storage |
US8949931B2 (en) | 2012-05-02 | 2015-02-03 | Cisco Technology, Inc. | System and method for monitoring application security in a network environment |
US9049105B1 (en) | 2012-05-11 | 2015-06-02 | Amazon Technologies, Inc. | Systems and methods for tracking and managing event records associated with network incidents |
US9203847B2 (en) * | 2012-06-26 | 2015-12-01 | At&T Intellectual Property I, L.P. | Detection and management of unauthorized use of cloud computing services |
US9503475B2 (en) | 2012-08-14 | 2016-11-22 | Ca, Inc. | Self-adaptive and proactive virtual machine images adjustment to environmental security risks in a cloud environment |
US8959513B1 (en) | 2012-09-27 | 2015-02-17 | Juniper Networks, Inc. | Controlling virtualization resource utilization based on network state |
US9154507B2 (en) * | 2012-10-15 | 2015-10-06 | International Business Machines Corporation | Automated role and entitlements mining using network observations |
WO2014066500A1 (fr) * | 2012-10-23 | 2014-05-01 | Hassell Suzanne P | Évaluation de modélisation analytique virtuelle destinée à un système de simulation d'opérations (cameo) |
US9712551B2 (en) * | 2012-11-30 | 2017-07-18 | The Boeing Company | Methods and systems for architecture-centric threat modeling, analysis and visualization |
US9171169B2 (en) * | 2012-12-14 | 2015-10-27 | Salesforce.Com, Inc. | System and method for dynamic analysis wrapper objects for application dataflow |
EP2753069A1 (fr) | 2013-01-08 | 2014-07-09 | PIXarithmic GmbH | Procédé de traitement vidéo en temps réel dynamique et appareil pour exécuter le procédé |
US8893283B2 (en) | 2013-01-31 | 2014-11-18 | Hewlett-Packard Development Company, L.P. | Performing an automated compliance audit by vulnerabilities |
US9804890B1 (en) | 2013-02-15 | 2017-10-31 | Amazon Technologies, Inc. | Termination policies for scaling compute resources |
US9195484B1 (en) | 2013-03-12 | 2015-11-24 | Amazon Technologies, Inc. | Dynamic logical zone assignment |
US9507540B1 (en) | 2013-03-14 | 2016-11-29 | Amazon Technologies, Inc. | Secure virtual machine memory allocation management via memory usage trust groups |
US10075470B2 (en) * | 2013-04-19 | 2018-09-11 | Nicira, Inc. | Framework for coordination between endpoint security and network security services |
US20140351415A1 (en) | 2013-05-24 | 2014-11-27 | PacketSled Inc. | Selective packet capture |
US9088541B2 (en) | 2013-05-31 | 2015-07-21 | Catbird Networks, Inc. | Systems and methods for dynamic network security control and configuration |
US9769174B2 (en) * | 2013-06-14 | 2017-09-19 | Catbird Networks, Inc. | Systems and methods for creating and modifying access control lists |
US11196636B2 (en) | 2013-06-14 | 2021-12-07 | Catbird Networks, Inc. | Systems and methods for network data flow aggregation |
US9912549B2 (en) | 2013-06-14 | 2018-03-06 | Catbird Networks, Inc. | Systems and methods for network analysis and reporting |
US9485279B2 (en) | 2013-11-04 | 2016-11-01 | Illumio, Inc. | Automated generation of access control rules for use in a distributed network management system that uses a label-based policy model |
WO2015066208A1 (fr) | 2013-11-04 | 2015-05-07 | Illumio, Inc. | Appariement dans un système de gestion de réseau distribué utilisant un modèle logique de politique multi-dimensionnel basé sur étiquettes |
US9674042B2 (en) | 2013-11-25 | 2017-06-06 | Amazon Technologies, Inc. | Centralized resource usage visualization service for large-scale network topologies |
US20150304343A1 (en) | 2014-04-18 | 2015-10-22 | Intuit Inc. | Method and system for providing self-monitoring, self-reporting, and self-repairing virtual assets in a cloud computing environment |
US9591027B2 (en) | 2015-02-17 | 2017-03-07 | Qualys, Inc. | Advanced asset tracking and correlation |
US9509574B2 (en) | 2015-04-03 | 2016-11-29 | Illumio, Inc. | End-to-end policy enforcement in the presence of a traffic midpoint device |
US10284520B2 (en) | 2017-02-02 | 2019-05-07 | Cisco Technology, Inc. | Mitigation against domain name system (DNS) amplification attack |
US10205736B2 (en) | 2017-02-27 | 2019-02-12 | Catbird Networks, Inc. | Behavioral baselining of network systems |
-
2015
- 2015-09-01 WO PCT/US2015/047964 patent/WO2016036752A2/fr active Application Filing
- 2015-09-01 EP EP15838627.6A patent/EP3238407A4/fr not_active Withdrawn
- 2015-09-01 RU RU2017127710A patent/RU2679179C1/ru not_active IP Right Cessation
-
2017
- 2017-09-18 US US15/707,989 patent/US10728251B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040243707A1 (en) * | 2001-10-01 | 2004-12-02 | Gavin Watkinson | Computer firewall system and method |
US20040075675A1 (en) * | 2002-10-17 | 2004-04-22 | Tommi Raivisto | Apparatus and method for accessing services via a mobile terminal |
US20050125389A1 (en) * | 2003-12-09 | 2005-06-09 | Electronic Data Systems Corporation | Providing access to a service using a service engine |
US20110277034A1 (en) * | 2010-05-06 | 2011-11-10 | Tenable Network Security, Inc. | System and method for three-dimensional visualization of vulnerability and asset data |
US20140213371A1 (en) * | 2011-08-04 | 2014-07-31 | Playware Studios Asia Pte Ltd | Method and System for Hosting Transient Virtual Worlds that can be Created, Hosted and Terminated Remotely and Automatically |
Also Published As
Publication number | Publication date |
---|---|
WO2016036752A2 (fr) | 2016-03-10 |
RU2679179C1 (ru) | 2019-02-06 |
EP3238407A4 (fr) | 2018-08-15 |
US10728251B2 (en) | 2020-07-28 |
EP3238407A2 (fr) | 2017-11-01 |
US20180069865A1 (en) | 2018-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016036752A3 (fr) | Systèmes et procédés permettant de créer et de modifier des listes de contrôle d'accès | |
WO2018026900A8 (fr) | Systèmes et procédés de gestion, de suivi et d'offre d'emploi | |
EP4354318A3 (fr) | Système de gestion de données personnalisables | |
MX2017012016A (es) | Comunicaciones de usuario con un comerciante a traves de un sistema de red social. | |
WO2015123444A3 (fr) | Services génomiques au consommateur intégrés | |
EP3148112A4 (fr) | Procédé de traitement d'informations, noeud de réseau, procédé et serveur d'authentification | |
SG10201803024SA (en) | System and method for token domain control | |
WO2014131021A3 (fr) | Procédés permettant de découvrir des relations dans des réseaux de l'internet des objets (iot), de configurer ces relations et de les utiliser | |
MX2018012802A (es) | Plataforma de comunicación inteligente contextual control multinivel, acceso variable, multiusuario. | |
WO2013176855A3 (fr) | Système d'actions vocales personnalisées | |
WO2014031794A3 (fr) | Articles pouvant être personnalisés électroniquement | |
WO2012161435A3 (fr) | Procédé de gestion d'informations sociales et système adapté à ce procédé | |
WO2014014936A3 (fr) | Détermination de scores d'influence | |
EP3547558A4 (fr) | Procédé de rétroaction d'informations, équipement utilisateur et équipement de réseau | |
WO2015170182A3 (fr) | Interface utilisateur et système de révision de publication | |
EP4236422A3 (fr) | Les dispositifs et méthodes permettant de découvrir des données collectées et des données analytiques dans un réseau | |
WO2016003541A3 (fr) | Systèmes informatiques dynamiques et utilisations de ceux-ci | |
WO2015160384A8 (fr) | Incitation au partage de contenu par des utilisateurs | |
WO2014014853A3 (fr) | Mise au point dynamique pour des environnements de visualisation de conversation | |
EP3608798A4 (fr) | Procédé de recherche de groupe basé sur un réseau social, dispositif, serveur et support de stockage | |
EP3613010A4 (fr) | Effets audio basés sur des données de réseautage social | |
EP3267388A4 (fr) | Système de commerce, serveur de gestion et programme | |
WO2014197770A3 (fr) | Partage informatisé de localisation de ressources numériques entre des organismes | |
EP3217351A4 (fr) | Système de gestion de biens comportant une structure de bénéfice de type à convergence en reliant des biens immobiliers et des biens mobiliers | |
WO2013167052A3 (fr) | Procédé et système de gestion d'informations internet, et serveur |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15838627 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2015838627 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2017127710 Country of ref document: RU Kind code of ref document: A |